Cyber Resilience: bridging the business and technology divide Stuart Rance AXELOS.com White Paper November 2014 2 Cyber Resilience: bridging the business and technology divide Contents 1 Cyber resilience: bridging the business and technology divide 3 2 What does the data show? 3 3 Who is affected by your cyber resilience decisions? 4 4 You can’t prevent cyber incidents 4 5 Who’s attacking you?5 6 Who is responsible for cyber resilience? 6 7 How should you manage cyber resilience? 7 8 Five steps to improve your cyber resilience 7 Endnotes11 About the author12 Reviewers12 About AXELOS12 Acknowledgments12 Trade marks and statements13 Cyber Resilience: bridging the business and technology divide 1 CYBER RESILIENCE: BRIDGING THE BUSINESS AND TECHNOLOGY DIVIDE Do you know how many security incidents your organization suffered from last year? If you think there weren’t any then the chances are that you’re in even worse trouble than people who can provide a detailed answer to that question. One cyber security firm recently estimated that as many as 71% of compromises go undetected1. Regardless of the size of your organization, the industry you operate in, or where in the world you’re located, the chances are that you suffered at least one security incident last year, and the cost of these incidents is increasing. As more and more aspects of our lives are digitized, and connected to the internet, the opportunities for attacks are increasing, the potential damage that the attacks could cause is increasing, and the need for us to prepare for these attacks becomes more urgent. This paper looks at how likely it is that your organization will suffer a security breach, how much that breach is likely to cost, and what you should be doing to protect your organization. 2 WHAT DOES THE DATA SHOW? There have been a number of studies of the frequency and cost of different types of security incident. Data from the UK2 shows differences based on the size of the organization, but even small organizations were more likely than not to have had a security breach in the last year. See the following table. Table 2.1: Security breaches in large and small organizations Large organizations Small organizations 81% 60% Median number of security breaches in the last year 16 6 Average cost of the organization’s worst security breach in the last year £600K to £1.15m £65k to £115k Percentage that had a security breach in the last year One area of risk that organizations worry about is data breaches, where information that should be confidential is exposed by an attack. Data from a worldwide study3 that looks at the cost and likelihood of different sizes of data breach shows the potential cost to organizations of this kind of incident. The smallest breach considered in the study is 10,000 records, and the report shows that there is a 22% chance of an organization suffering a material data breach involving a minimum of 10,000 records within a two-year period. The cost of a data breach varies depending on the country, ranging from $201 per record in Germany to $51 in India. Multiplying these figures together shows that the smallest of data breaches (10,000 records) in the country where there would be the lowest financial impact ($51 per record) would cost more than $500,000. The average cost of individual data breaches in this report ranged from $5.85 million in the USA to $1.37 million in India. This is a huge impact for a risk that has a likelihood of 22% in two years. 3 4 Cyber Resilience: bridging the business and technology divide 3 WHO IS AFFECTED BY YOUR CYBER RESILIENCE DECISIONS? A minor cyber incident might just be a small inconvenience to a few people within your organization, but if you suffer a major breach then it could affect lots of people. Not only would your staff and your organization be affected but it could have a major impact on your customers, your partners, entire supply chains that you are part of, and even on the infrastructure of the country. Companies that suffer a major data breach may impact the privacy of millions of their customers. The effects on the business itself may be enormous. As well as direct costs, such as compensation and fines, the business may suffer considerable reputational damage, leading to significant loss of business in the short term as customers move away. Sometimes the brand is irreparably damaged. In the most extreme cases organizations may cease trading as a direct result of a cyber incident. For example, an attack on Code Spaces4 deleted much of their customers’ data and they were forced out of business. The National Cyber Security Alliance estimates that ‘60% of small businesses will close within six months of a cyberattack’5. Many organizations do survive cyber incidents, and many of these small businesses may have been about to fail anyway, but a well-managed organization should understand risks to their business, including cyber risks, and plan how they will respond to these. Some organizations think that criminals are unlikely to target them as they have little of value to the attackers; they don’t realize how these criminals work. If they can breach your company’s security they may be able to use your systems or credentials as a conduit to your customers, potentially stealing much more lucrative information, and leaving your company with a lot of embarrassing (and potentially expensive) explaining to do. One well-publicised example of this was the major data breach at Target in the USA6. The hackers first breached a company that provided refrigeration services, and then used the refrigeration company’s login credentials in the attack on Target. As well as the cost and impact of a potential breach, you also need to consider the cost and impact of the controls you put in place to help protect your business and its customers. The cost of these controls includes not just how much you spend on implementing the controls, but also the impact they have on your ability to do business. Controls can affect both the efficiency of your own staff and how easy it is for customers to do business with you. If customers find your security controls too intrusive they may take their business elsewhere. If employees find your security controls too intrusive they may find ways to work around them, resulting in increased risk. Looking at this same issue from a more positive view, you may decide to accept a level of cyber risk in order to be first to market with a new innovation, or to make it easy for your customers to do business with you. What is important is that you understand the risks you are taking, and the benefits that you are hoping to achieve by taking those risks. 4 YOU CAN’T PREVENT CYBER INCIDENTS However much you spend on cyber resilience, and however good your controls are, you can never completely defend your organization against cyber attacks. A sufficiently determined attacker will always be able to breach your controls and cause a cyber incident. This doesn’t mean that you should give up, and not bother to defend yourself at all. You can make it harder for the attackers, and a good set of preventative controls will defeat many attacks, resulting in a much lower frequency of security incidents. If you are very lucky you may be able to prevent significant attacks for an extended period of time, saving you cost and embarrassment. However, preventative controls can never be sufficient. You must recognize the likelihood that your security will eventually be breached and you need to have plans in place to deal with this. Cyber Resilience: bridging the business and technology divide As well as the preventative controls that you put in place to prevent attacks from succeeding, you need to invest in two other types of control: Detective controls, to identify when a security attack is happening. The sooner you detect an attack, the greater your ability to contain the damage and reduce the impact. Ideally, you should detect attacks before they have had a significant impact and take steps to prevent them from escalating. Many organizations have suffered data breaches that have gone on for months, because they were not detected, resulting in much greater cost than if they had been detected early. One of the most expensive data breaches in 2014 was at Home Depot, where malware that enabled criminals to copy credit card information from point of sales terminals was not detected from when it was installed in April 2014 until September 20147 Corrective controls, to correct the situation after an incident has been detected. There are many different types of corrective control, including a crisis management team, a security incident management process, a business continuity plan, and other pre-defined response plans for responding to known types of attack. These corrective controls can help to minimize the damage from a cyber attack, but they need to be well designed and properly rehearsed long before they are needed. If your cyber resilience defences are mostly focussed on preventative controls then it is likely that you will eventually have a very expensive security breach. It is essential to invest in a balance of controls that prevent incidents, where it is cost-effective to do so, and also contain the damage from incidents that can’t be prevented. Your approach to cyber resilience needs to be built in to your management system. You can’t just ask a security expert to create a set of controls while you continue to run everything the way you always have. You need to incorporate cyber resilience into the way you manage everything you do. One effective way to manage cyber resilience is to think about a cyber resilience management lifecycle. This approach is used in the forthcoming AXELOS Cyber Resilience Best Practice Guide8, which describes a five-stage cyber resilience lifecycle based on the concepts behind the ITIL®9 service lifecycle. Strategy: Understand your organizations objectives for cyber resilience, set your risk appetite, and define high-level policies Design: Design the management system and controls you need to meet the intention of the strategy Transition: Test all the controls and move them into operational use Operation: Operate your controls, detect and manage cyber resilience events and incidents Continual improvement: Ensure that cyber resilience continues to provide the level of protection you need in a constantly changing environment. 5 WHO’S ATTACKING YOU? Many people think that cyber resilience is all about protecting the organization from gangs of cyber criminals. It is true that many of the biggest data breaches have been the result of attacks by criminals3, but these are not the only causes of cyber incidents. Many attacks are carried out by insiders10; people that you have intentionally allowed access to your information. These insider attacks can be just as devastating as an attack by external criminal gangs. In March 2014, an insider published personal details of 100,000 employees of a UK supermarket11, and the data that was exposed by Edward Snowden and Chelsea Manning has had a major impact on numerous governments. 5 6 Cyber Resilience: bridging the business and technology divide Many data breaches are not attacks at all, but simply the result of carelessness or poor procedures. One example of this was the accidental loss of CDs containing details about child benefits for 25 million people in the UK12. This was not a malicious act, but it resulted in substantial embarrassment at the highest levels of government. 6 WHO IS RESPONSIBLE FOR CYBER RESILIENCE? Cyber resilience is about more than just IT risks, it deals with business risks that could impact the survival of the whole organization. This means that decisions about cyber resilience need to be made by executive management and the board of directors (or equivalent). Clearly, the board are not going to be experts in the technology aspects of cyber resilience, and nobody is suggesting that they should be. Design and implementation of cyber resilience controls will need to be delegated to people with specialist knowledge. Nevertheless, there are some aspects of cyber resilience where responsibility will always rest with the board. These include: Ownership of the risk to the business. The most significant risks to the business must be understood and discussed at board level. The board will be accountable to the shareholders (or equivalent in public sector organizations), and to regulators, for any major breaches. They must have sufficient awareness of the risks the business is taking so they can make the right decisions. The board should also decide on the overall approach to risk and the risk appetite of the organization, and they should communicate these clearly to people carrying out risk management. A summary of the risk approach is often shared with stakeholders via a company’s annual report Budgeting for cyber resilience. There may be a need for significant investment to help the organization manage cyber resilience risks. People managing cyber resilience must be allocated sufficient budget to provide the agreed level of resilience Awareness and communication. One important aspect of cyber resilience is engaging staff, and ensuring that they understand both the risks, and their responsibility for helping to mitigate those risks. To be effective, this communication needs to have the support of the board, and be communicated top-down throughout the organization Crisis management. In the event of a major cyber incident, that could impact the future of the organization, the board will need to be briefed, and may need to make rapid decisions about how they want to respond. This can only be done well if crisis management responsibilities have been allocated, and people have rehearsed how they will respond to the various potential scenarios. It is not only the board that has responsibility for cyber resilience. Everybody can make a difference to cyber resilience, either positively or negatively. Many security breaches can be prevented if people understand the risks and take appropriate actions, and the impact of security breaches can be minimized when everyone in the organization helps to detect and recover from the breaches that can’t be prevented. Information security staff must ensure that appropriate controls have been designed and implemented. Information owners must understand their responsibilities for communicating the value of their information, and ensuring that it is properly protected. Technical staff must ensure that controls have been fully and correctly implemented. And everybody must help to identify and report risks, and must be vigilant to help defend against risks such as phishing attacks. Cyber Resilience: bridging the business and technology divide 7 HOW SHOULD YOU MANAGE CYBER RESILIENCE? Some organizations try to implement an information security management system, or a cyber resilience management system, which is independent of everything else they do. It has its own policies, procedures, standards, roles and responsibilities, goals and metrics. This kind of management system is often based on a standard such as ISO/IEC 2700113 or the NIST Cybersecurity Framework14. There is a lot of value in following a standard, as this can help to ensure that you have comprehensive coverage of everything that needs to be included, but it is essential that you incorporate the requirements of the standard into your own management system. If you try to run cyber security as a completely separate activity to managing your business then there will be duplication and conflict, and you will not achieve your goals. It is also important that cyber resilience is managed in a way that meets the needs of the organization. For example when there is a major incident there may be a need for some business services to wait while others are restored. The decision on what the business priorities are for service restoration should be made by the business, not by cyber resilience staff or IT staff. When you create the management system that runs your business, you define policies, procedures, standards, roles and responsibilities, goals and metrics. These should include everything needed for cyber resilience as well as everything needed for every other aspect of running your business. Cyber resilience has a much wider scope than just IT systems and services, but the way you manage IT services can have a big impact on cyber resilience, so you will need effective IT service management (ITSM) to help achieve your cyber resilience goals. Adopting the ITIL best practice framework for IT service management9 can help to ensure you have effective and consistent IT service management, and as explained above, the stages of the service lifecycle defined by ITIL can be equally useful in cyber resilience. 8 FIVE STEPS TO IMPROVE YOUR CYBER RESILIENCE Every organization has some controls in place to provide cyber resilience, but we all need to make sure we continually improve. The people who want to defeat your controls are continually improving their skills and investing in new technology, your business is continually investing in new and improved technology, and their priorities are continually changing. If your cyber resilience doesn’t also keep improving then it will gradually become less effective. 1. INCLUDE CYBER RESILIENCE IN REGULAR DISCUSSIONS AT BOARD LEVEL Cyber resilience must be driven from the top. It is up to the board of directors (or equivalent) to set policy for how risk will be managed in the organization, to provide a suitable budget for cyber resilience, and to demonstrate their support for cyber resilience controls throughout the organization. This means that cyber resilience should be a regular topic at board meetings, with decisions about cyber resilience being documented and communicated throughout the organization. Many major cyber resilience breaches can be traced back to a lack of leadership and governance, for example, before the Home Depot data breach, security staff had pointed out the need for new software and training, and managers replied “We sell hammers”15, implying a complete lack of interest in cyber resilience. 7 8 Cyber Resilience: bridging the business and technology divide Executive management should be involved in discussions about what information is critical to the business, what the risks to that information are, and what the high-level strategy for managing those risks will be. Summaries of this should be presented to the board for their agreement at regular intervals. This might be just once a year in a very stable organization or more frequently in an organization with more rapid change. 2. MAKE SURE YOU HAVE THE RIGHT BALANCE BETWEEN PREVENTATIVE, DETECTIVE AND CORRECTIVE CONTROLS If you haven’t reviewed your cyber resilience controls recently, then, it’s likely that they are heavily biased towards prevention, with insufficient focus on detection and correction. There are lots of things you can do to detect security incidents. Many of these involve using tools, which can be quite expensive, but there are open source tools that help you detect many types of attack (for example, to review log files, or create encrypted checksums for detecting unauthorized alterations to files). Probably the most important corrective control that you need to focus on – if you haven’t already done so – is the process you use for managing cyber incidents. When an incident happens, you need to respond quickly and correctly – to do this involves thinking through the likely scenarios and practicing how you would respond. Everybody who has a role to play needs to be involved in this practice, to ensure that they make the right decisions when they are under pressure from a real incident. Essential aspect of cyber resilience incident management include: Deciding who will manage the incident, and what resources will be available to support them Prioritising the need to investigate causes and protect evidence against the need to restore normal business operations Communicating the correct information to stakeholders. In addition to keeping staff and customers informed, this may include legal and regulatory requirements, as well as having a strategy for communicating with the press and shareholders Involving the right people with the skills and knowledge needed to resolve the incident Verifying that the incident has been resolved, and that no additional vulnerabilities have been introduced Learning from the incident to improve the incident management process, as well as reduce the likelihood or impact of any similar future incidents. 3. MAKE SURE YOU HAVE THE RIGHT BALANCE BETWEEN PEOPLE, PROCESS AND TECHNOLOGY CONTROLS Many organizations focus their cyber resilience efforts on technology controls. Unless these are balanced with the right people and process controls they will be of very limited value. Good cyber resilience depends on people with the right knowledge, attitudes, behaviour and culture doing the right things. If you don’t motivate, train and periodically remind your people then your investments in security technology will be largely wasted. Similarly, if you don’t have effective processes Cyber Resilience: bridging the business and technology divide then the investment in technology will be wasted. For example, if you have invested in tools to detect when credit card data is being copied from your network, but have no process in place for responding to any alerts the tools generate you will get very little value from your investment. You only get the value if people understand that they must take the alerts seriously and have been trained in how to respond to them. You need to provide your staff with appropriate training to ensure that they understand the need for cyber resilience, and the contribution that they can make to helping protect your business, but training is never sufficient, you also need to foster the attitudes, behaviour and culture that is needed. This requires senior management to consistently demonstrate the behaviours that they expect from others, as well as to issue regular reminders and encouragement. Technology that is designed to protect your business needs to be configured and managed properly, and it must be reliably installed in every place that it is required. If a critical patch is missed from just one server, or a firewall rule is misconfigured on just one route, this can undermine all your investment in protective technology. Getting this right depends on the processes you have in place, and on the people who implement these. Processes that can help with this include, for example: Asset and configuration management to ensure that you know what technology you have to manage ITSM change management, to ensure that IT components are configured correctly before they are deployed Assurance testing and internal audit, to ensure that components remain in compliance with defined standards. 4. ADOPT STANDARDS AND BEST PRACTICES INTO YOUR MANAGEMENT SYSTEM There are many different things that you need to do to provide an acceptable level of Cyber resilience. But if you try to design a management system to provide an appropriate level of protection from scratch, by simply thinking about what is needed, then you are highly likely to omit many essential controls. Standards and best practices package the accumulated wisdom of many other people in a way that allows your business to incorporate the specific features you require within your own management system, to help ensure you cover everything you need. This enables you to learn from the mistakes of others, rather than having to make every mistake yourself. You can’t simply adopt one standard or best practice to cover all of your needs, because they all have different scope and coverage and none of them is likely to provide everything you need to run your business. Some of the things that you should consider adopting into your management system include: AXELOS Cyber Resilience Best Practice Guide (to be published in 2015)8 ISO/IEC 270019 – the international standard for information security management NIST Cybersecurity framework10 – the US framework for improving critical infrastructure cybersecurity – this is also useful for organizations that don’t manage critical infrastructure ITIL best practice framework for IT service management11 – the most widely adopted approach for management of IT services Management of Risk (M_o_R®)16 – best practice framework for management of risk, to help organizations make informed decisions about the risks that affect their objectives 9 10 Cyber Resilience: bridging the business and technology divide ISO 31000 – International standard defining risk management principles and guidelines SANS Institute critical security controls17 – a list of the top 20 recommended security controls. This can provide a great starting point for cyber resilience Cyber essentials scheme18 – a UK government scheme to help organizations protect themselves against common cyber attacks. 5. KEEP UP TO DATE WITH EMERGING THREATS TO ENSURE THAT YOUR CYBER RESILIENCE CONTROLS REMAIN APPROPRIATE Even if you design a perfect management system, and implement controls that cover every possible risk to your organization, this will still not provide you with all the protection you need. This is because threats to your cyber resilience are constantly evolving. Criminals determined to find ways of breaching organizations’ cyber resilience devise new ways to attack, and vendors discover new vulnerabilities in their products. If you want to maintain your level of cyber resilience you must keep abreast of these evolving threats and vulnerabilities. Make sure you are in touch with other organizations that operate in the same countries and industries as you, so that you can share information about new threats and vulnerabilities. You should also make sure you get updates from vendors of all technology that you use, to learn about new vulnerabilities and countermeasures from them. Monitor publicly available sources of information such as US-CERT19, CERT-UK20, the NIST National Vulnerability Database21, and lists maintained by private companies. These can help you to learn about emerging threats and vulnerabilities. Use this information to update your risk register, and regularly review your risk register to ensure you have correctly prioritized and communicated how you will respond to these threats and vulnerabilities. Cyber Resilience: bridging the business and technology divide ENDNOTES 1 Trustwave Holdings, 2014 Trustwave Global Security Report, May 2014 2 Department for Business Inovation & Skills, 2014 Information security breaches survey 3 Ponemon Institute, IBM 2014 Cost of Data Breach Study: Global Analysis 4 PC World, June 19 2014, Hacker puts ‘full redundancy’ code-hosting firm out of business 5 National Cyber Security Alliance, Small Business Online Security Infographic 6 Wall Street Journal, Feb 6 2014, Target Breach Began With Contractor’s Electronic Billing Link 7 Reuters, Sep 18 2014, Home Depot breach bigger than Target at 56 million cards 8 AXELOS Cyber Resilience Best Practice Guide, to be published 2015 9 AXELOS, 2011, ITIL Service Lifecycle Publication Suite 10 pwc, September 2014, Managing cyber risks in an interconnected world: Key findings from The Global State of Information Security Survey 2015 11 BBC, 14 March 2014, Wm Morrison supermarket suffers payroll data theft 12 BBC, 25 June 2008, Timeline: Child benefits records loss 13 ISO 27001:2013 Information technology – Security techniques - Information security management systems - Requirements. Available from http://www.iso.org/, or from the standards organization in your local country 14 NIST Framework for Improving Critical Infrastructure Cybersecurity 15 New York Times, Sept 19 2014, Ex-Employees Say Home Depot Left Data Vulnerable 16 OGC, 2010, Management of Risk: Guidance for Practitioners 17 SANS Institute, Critical Security Controls - Version 5 18 Cyber essentials scheme, June 2014, Department for Business, Innovation & Skills 19 US-CERT United States Computer Emergency Readiness Team 20 CERT-UK United Kingdom Computer Emergency Readiness Team 21 NIST National Vulnerability Database 11 12 Cyber Resilience: bridging the business and technology divide ABOUT THE AUTHOR Stuart Rance is a consultant, trainer and author, and owner of Optimal Service Management Ltd. Stuart works with a wide variety of clients in many countries, helping them use ideas from IT service management and information security management to create business value for themselves and their customers. He is a Chartered Fellow of BCS (FBCS CITP), a Fellow in Service Management at prISM (FSM), and a Certified Information Systems Security Professional (CISSP). Stuart shares his expertise widely, regularly presenting at events and writing books, white papers, blogs and pocked guides on all aspects of IT. He is the author of ITIL Service Transition, 2011 edition, and co-author of the ITIL V3 Glossary. He has written many pocket guides for itSMF, for the official ITIL portfolio and is one of the authors of the forthcoming Cyber Resilience Best Practice Guide. REVIEWERS AXELOS would like to thank Alex Hernandez (Director of CIO Advisory Services, KPMG US) for reviewing this paper. ABOUT AXELOS AXELOS are a joint venture company, created by the Cabinet Office on behalf of Her Majesty’s Government in the United Kingdom and Capita plc to run the global best practice portfolio, including the ITIL and PRINCE2® professional standards. The goals of AXELOS are many and varied, each one aimed at helping businesses and individuals reach success, empowering them to truly stand out in a competitive market. We continually promote and advocate quality training. We strive to encourage growth, development and progress. We always look for innovative new solutions to improve best practice standards and processes across the board. The result is improved skills that are relevant to the industry as a whole, and enhanced employability for all, benefiting the global economy. The benefit to you and your business in particular: better trained employees, streamlined operations, and the peace of mind of knowing that you are working with an industry-leading organization, which provides products and services with a long-standing reputation for setting the industry benchmark. ACKNOWLEDGEMENTS Sourced and published on www.AXELOS.com. Our White Paper series should not be taken as constituting advice of any sort and no liability is accepted for any loss resulting from use of or reliance on its content. While every effort is made to ensure the accuracy and reliability of the information, AXELOS cannot accept responsibility for errors, omissions or inaccuracies. Content, diagrams, logos, and jackets are correct at time of going to press but may be subject to change without notice. © Copyright AXELOS. Cyber Resilience: bridging the business and technology divide Reuse of this White Paper is permitted solely in accordance with the permission terms at https://www.axelos.com/case-study-and-white-paper-search. A copy of these terms can be provided on application toAXELOS at [email protected]. TRADE MARKS AND STATEMENTS The AXELOS logo is a trade mark of AXELOS Limited. The AXELOS swirl logo is a trade mark of AXELOS Limited. ITIL® is a registered trade mark of AXELOS Limited. M_o_R® is a regsitered trade mark of AXELOS Limited. 13
© Copyright 2026 Paperzz